-
1
-
-
42549166924
-
Security aspects of mobile phone virus: A critical survey
-
DOI 10.1108/02635570810868344
-
D.-H. Shi, B. Lin, H.-S. Chiang, and M.-H. Shih, "Security Aspects of Mobile Phone Virus: A Critical Survey," Industrial Management and Data System, vol. 108, no. 4, pp. 478-494, 2008. (Pubitemid 351590943)
-
(2008)
Industrial Management and Data Systems
, vol.108
, Issue.4
, pp. 478-494
-
-
Shih, D.-H.1
Lin, B.2
Chiang, H.-S.3
Shih, M.-H.4
-
2
-
-
57349195106
-
Detecting energy-greedy anomalies and mobile malware variants
-
H. Kim, J. Smith, and K.G. Shin, "Detecting Energy-Greedy Anomalies and Mobile Malware Variants," Proc. Sixth Int'l Conf. Mobile Systems, Applications, and Services (MobiSys 08), pp. 239-252, 2008.
-
(2008)
Proc. Sixth Int'l Conf. Mobile Systems, Applications, and Services (MobiSys 08)
, pp. 239-252
-
-
Kim, H.1
Smith, J.2
Shin, K.G.3
-
3
-
-
57349173904
-
A systematic approach for cell-phone worm containment
-
L. Xie, H. Song, T. Jaeger, and S. Zhu, "A Systematic Approach for Cell-Phone Worm Containment," Proc. 17th Int'l World Wide Web Conf. (WWW '08), pp. 1083-1084, 2008.
-
(2008)
Proc. 17th Int'l World Wide Web Conf. (WWW '08)
, pp. 1083-1084
-
-
Xie, L.1
Song, H.2
Jaeger, T.3
Zhu, S.4
-
4
-
-
70349263625
-
Stealthy video capturer: A new video-based spyware in 3G Smartphones
-
N. Xu, F. Zhang, Y. Luo, W. Jia, D. Xuan, and J. Teng, "Stealthy Video Capturer: A New Video-Based Spyware in 3G Smartphones," Proc. Second ACM Conf. Wireless Network Security (WiSec '09), pp. 69-78, 2009.
-
(2009)
Proc. Second ACM Conf. Wireless Network Security (WiSec '09)
, pp. 69-78
-
-
Xu, N.1
Zhang, F.2
Luo, Y.3
Jia, W.4
Xuan, D.5
Teng, J.6
-
5
-
-
58849141571
-
Modeling propagation dynamics of bluetooth worms (Extended Version)
-
Mar
-
G. Yan and S. Eidenbenz, "Modeling Propagation Dynamics of Bluetooth Worms (Extended Version)," IEEE Trans. Mobile Computing, vol. 8, no. 3, pp. 353-368, Mar. 2009.
-
(2009)
IEEE Trans. Mobile Computing
, vol.8
, Issue.3
, pp. 353-368
-
-
Yan, G.1
Eidenbenz, S.2
-
6
-
-
79955073428
-
Network immunization and virus propagation in email networks: Experimental evaluation and analysis
-
C. Gao, J. Liu, and N. Zhong, "Network Immunization and Virus Propagation in Email Networks: Experimental Evaluation and Analysis," Knowledge and Information Systems, vol. 27, no. 2, pp. 253-279, 2011.
-
(2011)
Knowledge and Information Systems
, vol.27
, Issue.2
, pp. 253-279
-
-
Gao, C.1
Liu, J.2
Zhong, N.3
-
7
-
-
66349131932
-
Understanding the Spreading Patterns of Mobile Phone Viruses
-
P. Wang, M.C. Gonzalez, C.A. Hidalgo, and A.-L. Barabasi, "Understanding the Spreading Patterns of Mobile Phone Viruses," Science, vol. 324, no. 5930, pp. 1071-1076, 2009.
-
(2009)
Science
, vol.324
, Issue.5930
, pp. 1071-1076
-
-
Wang, P.1
Gonzalez, M.C.2
Hidalgo, C.A.3
Barabasi, A.-L.4
-
8
-
-
79551680433
-
On Modeling Malware Propagation in Generalized Social Networks
-
Jan
-
S. Cheng, W.C. Ao, P. Chen, and K. Chen, "On Modeling Malware Propagation in Generalized Social Networks," IEEE Comm. Letters, vol. 15, no. 1, pp. 25-27, Jan. 2011.
-
(2011)
IEEE Comm. Letters
, vol.15
, Issue.1
, pp. 25-27
-
-
Cheng, S.1
Ao, W.C.2
Chen, P.3
Chen, K.4
-
9
-
-
58849089560
-
An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols in Wireless Sensor Networks
-
Mar
-
P. De, Y. Liu, and S.K. Das, "An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols in Wireless Sensor Networks," IEEE Trans. Mobile Computing, vol. 8, no. 3, pp. 413-425, Mar. 2009.
-
(2009)
IEEE Trans. Mobile Computing
, vol.8
, Issue.3
, pp. 413-425
-
-
De, P.1
Liu, Y.2
Das, S.K.3
-
10
-
-
67651048997
-
Deployment aware modeling of node compromise spread in wireless sensor networks using epidemic theory
-
P. De, Y. Liu, and S.K. Das, "Deployment Aware Modeling of Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory," ACM Trans. Sensor Networks, vol. 5, no. 3, pp. 1-33, 2009.
-
(2009)
ACM Trans. Sensor Networks
, vol.5
, Issue.3
, pp. 1-33
-
-
De, P.1
Liu, Y.2
Das, S.K.3
-
11
-
-
44849122540
-
Understanding individual human mobility patterns
-
DOI 10.1038/nature06958, PII NATURE06958
-
M.C. Gonzalez, C.A. Hidalgo, and A.L. Barabasi, "Understanding Individual Human Mobility Patterns," Nature, vol. 453, no. 7196, pp. 779-782, 2008. (Pubitemid 351793783)
-
(2008)
Nature
, vol.453
, Issue.7196
, pp. 779-782
-
-
Gonzalez, M.C.1
Hidalgo, C.A.2
Barabasi, A.-L.3
-
12
-
-
34248995311
-
Modeling and simulation study of the propagation and defense of internet e-mail worms
-
Ar-June
-
C.C. Zou, D. Towsley, and W. Gong, "Modeling and Simulation Study of the Propagation and Defense of Internet E-Mail Worms," IEEE Trans. Dependable and Secure Computing, vol. 4, no. 2, pp. 105-118, Apr.-June 2007.
-
(2007)
IEEE Trans. Dependable and Secure Computing
, vol.4
, Issue.2
, pp. 105-118
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
-
13
-
-
74949101283
-
Designing system-level defenses against cellphone malware
-
L. Xie, X. Zhang, A. Chaugule, T. Jaeger, and S. Zhu, "Designing System-Level Defenses against Cellphone Malware," Proc. IEEE 28th Int'l Symp. Reliable Distributed Systems (SRDS '09), pp. 83-90, 2009.
-
(2009)
Proc.IEEE 28th Int'l Symp. Reliable Distributed Systems (SRDS '09)
, pp. 83-90
-
-
Xie, L.1
Zhang, X.2
Chaugule, A.3
Jaeger, T.4
Zhu, S.5
-
14
-
-
57349125651
-
Behavioral detection of malware on mobile handsets
-
A. Bose, X. Hu, K.G. Shin, and T. Park, "Behavioral Detection of Malware on Mobile Handsets," Proc. Sixth Int'l Conf. Mobile Systems, Applications, and Services (MobiSys '08), pp. 225-238, 2008.
-
(2008)
Proc. Sixth Int'l Conf. Mobile Systems, Applications, and Services (MobiSys '08)
, pp. 225-238
-
-
Bose, A.1
Hu, X.2
Shin, K.G.3
Park, T.4
-
15
-
-
77953295152
-
CPMC: An efficient proximity malware coping scheme in smartphone-based mobile networks
-
F. Li, Y. Yang, and J. Wu, "CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-Based Mobile Networks," Proc. IEEE INFOCOM, pp. 2811-2819, 2010.
-
(2010)
Proc. IEEE INFOCOM
, pp. 2811-2819
-
-
Li, F.1
Yang, Y.2
Wu, J.3
-
16
-
-
70349663942
-
Defending mobile phones from proximity malware
-
G. Zyba, G.M. Voelker, M. Liljenstam, A. Mehes, and P. Johansson, "Defending Mobile Phones from Proximity Malware," Proc. IEEE INFOCOM, pp. 1503-1511, 2009.
-
(2009)
Proc. IEEE INFOCOM
, pp. 1503-1511
-
-
Zyba, G.1
Voelker, G.M.2
Liljenstam, M.3
Mehes, A.4
Johansson, P.5
-
17
-
-
69649105296
-
Understanding spatial connectivity of individuals with non uniform population density
-
P. Wang and M.C. Gonzalez, "Understanding Spatial Connectivity of Individuals with Non Uniform Population Density," Philosophical Trans. Royal Soc. A, vol. 367, no. 1901, pp. 3321-3329, 2009.
-
(2009)
Philosophical Trans. Royal Soc. A
, vol.367
, Issue.1901
, pp. 3321-3329
-
-
Wang, P.1
Gonzalez, M.C.2
-
18
-
-
70349656216
-
SWIM: A Simple Model to Generate Small Mobile Worlds
-
A. Mei and J. Stefa, "SWIM: A Simple Model to Generate Small Mobile Worlds," Proc. IEEE INFOCOM, pp. 2106-2113, 2010.
-
(2010)
Proc. IEEE INFOCOM
, pp. 2106-2113
-
-
Mei, A.1
Stefa, J.2
-
19
-
-
70349659583
-
SLAW: A mobility model for human walks
-
K. Lee, S. Hong, S.J. Kim, I. Rhee, and S. Chong, "SLAW: A Mobility Model for Human Walks," Proc. IEEE INFOCOM, pp. 855-863, 2009.
-
(2009)
Proc. IEEE INFOCOM
, pp. 855-863
-
-
Lee, K.1
Hong, S.2
Kim, S.J.3
Rhee, I.4
Chong, S.5
-
20
-
-
77957566436
-
Modelling the scaling properties of human mobility
-
C. Song, T. Koren, P. Wang, and A.-L. Barabasi, "Modelling the Scaling Properties of Human Mobility," Nature Physics, vol. 6, no. 10, pp. 818-823, 2010.
-
(2010)
Nature Physics
, vol.6
, Issue.10
, pp. 818-823
-
-
Song, C.1
Koren, T.2
Wang, P.3
Barabasi, A.-L.4
-
21
-
-
70349659420
-
A social network based patching scheme for worm containment in cellular networks
-
Z. Zhu, G. Cao, S. Zhu, S. Ranjan, and A. Nucci, "A Social Network Based Patching Scheme for Worm Containment in Cellular Networks," Proc. IEEE INFOCOM, pp. 1476-1484, 2009.
-
(2009)
Proc. IEEE INFOCOM
, pp. 1476-1484
-
-
Zhu, Z.1
Cao, G.2
Zhu, S.3
Ranjan, S.4
Nucci, A.5
-
23
-
-
57649176549
-
Autonomy-oriented computing (AOC): The nature and implications of a paradigm for self-organized computing
-
J. Liu, "Autonomy-Oriented Computing (AOC): The Nature and Implications of a Paradigm for Self-Organized Computing," Proc. Fourth Int'l Conf. Natural Computation (ICNC '08), pp. 3-11, 2008.
-
(2008)
Proc. Fourth Int'l Conf. Natural Computation (ICNC '08)
, pp. 3-11
-
-
Liu, J.1
-
25
-
-
79953723201
-
Network immunization with distributed autonomy-oriented entities
-
July
-
C. Gao, J. Liu, and N. Zhong, "Network Immunization with Distributed Autonomy-Oriented Entities," IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 7, pp. 1222-1229, July 2011.
-
(2011)
IEEE Trans. Parallel and Distributed Systems
, vol.22
, Issue.7
, pp. 1222-1229
-
-
Gao, C.1
Liu, J.2
Zhong, N.3
-
26
-
-
79551627200
-
Human mobility networks, travel restrictions, and the global spread of 2009 h1n1 pandemic
-
P. Bajardi, C. Poletto, J. Ramasco, M. Tizzoni, V. Colizza, and A. Vespignani, "Human Mobility Networks, Travel Restrictions, and the Global Spread of 2009 H1N1 Pandemic," PLos One, vol. 6, no. 1, p. e16591, 2011.
-
(2011)
PLos One
, vol.6
, Issue.1
-
-
Bajardi, P.1
Poletto, C.2
Ramasco, J.3
Tizzoni, M.4
Colizza, V.5
Vespignani, A.6
-
27
-
-
0035794256
-
Epidemic spreading in scale-free networks
-
DOI 10.1103/PhysRevLett.86.3200
-
R. Pastor-Satorras and A. Vespignani, "Epidemic Spreading in Scale-Free Networks," Physical Rev. Letters, vol. 86, no. 14, pp. 3200-3203, 2001. (Pubitemid 32317894)
-
(2001)
Physical Review Letters
, vol.86
, Issue.14
, pp. 3200-3203
-
-
Pastor-Satorras, R.1
Vespignani, A.2
-
28
-
-
41349106348
-
The spread of epidemic disease on networks
-
M.E.J. Newman, "The Spread of Epidemic Disease on Networks," Physical Rev. E, vol. 66, no. 1, p. 016128, 2002.
-
(2002)
Physical Rev. e
, vol.66
, Issue.1
, pp. 016128
-
-
Newman, M.E.J.1
-
29
-
-
77149139158
-
Limits of predictability in human mobility
-
C. Song, Z. Qu, N. Blumm, and A.-L. Barabasi, "Limits of Predictability in Human Mobility," Science, vol. 327, no. 5968, pp. 1018-1021, 2010.
-
(2010)
Science
, vol.327
, Issue.5968
, pp. 1018-1021
-
-
Song, C.1
Qu, Z.2
Blumm, N.3
Barabasi, A.-L.4
-
30
-
-
51349144836
-
On the levy walk nature of human mobility
-
I. Rhee, M. Shin, S. Hong, K. Lee, and S. Chong, "On the Levy Walk Nature of Human Mobility," Proc. IEEE INFOCOM, pp. 924-932, 2008.
-
(2008)
Proc. IEEE INFOCOM
, pp. 924-932
-
-
Rhee, I.1
Shin, M.2
Hong, S.3
Lee, K.4
Chong, S.5
-
31
-
-
34548359387
-
Modeling time-variant user mobility in wireless mobile networks
-
DOI 10.1109/INFCOM.2007.94, 4215676, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
W. Hsu, T. Spyropoulos, K. Psounis, and A. Helmy, "Modeling Time-Variant User Mobility in Wireless Mobile Networks," Proc. IEEE INFOCOM, pp. 758-766, 2007. (Pubitemid 47334294)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 758-766
-
-
Hsu, W.-J.1
Spyropoulost, T.2
Psounis, K.3
Helmy, A.4
-
32
-
-
57349123036
-
Can you infect me Now? Malware propagation in mobile phone networks
-
C. Fleizach, M. Liljenstam, and P. Johansson, "Can You Infect Me Now? Malware Propagation in Mobile Phone Networks," Proc. ACM Workshop Recurring Malcode (WORM '07), pp. 61-68, 2007.
-
(2007)
Proc. ACM Workshop Recurring Malcode (WORM '07)
, pp. 61-68
-
-
Fleizach, C.1
Liljenstam, M.2
Johansson, P.3
-
33
-
-
35448979944
-
SmartSiren: Virus detection and alert for smartphones
-
DOI 10.1145/1247660.1247690, MobiSys'07: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services
-
J. Cheng, S.H.Y. Wong, H. Yang, and S. Lu, "Smartsiren Virus Detection and Alert for Smartphones," Proc. Fifth Int'l Conf. Mobile Systems, Applications, and Services (MobiSys '07), pp. 258-271, 2007. (Pubitemid 47620930)
-
(2007)
MobiSys'07: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services
, pp. 258-271
-
-
Cheng, J.1
Wong, S.H.Y.2
Yang, H.3
Lu, S.4
-
34
-
-
41349120887
-
Attack vulnerability of complex networks
-
P. Holme, B.J. Kim, C.N. Yoon, and S.K. Han, "Attack Vulnerability of Complex Networks," Physical Rev. E, vol. 65, no. 5, p. 056109, 2002.
-
(2002)
Physical Rev. e
, vol.65
, Issue.5
, pp. 056109
-
-
Holme, P.1
Kim, B.J.2
Yoon, C.N.3
Han, S.K.4
-
36
-
-
84872795827
-
Modeling and restraining mobile virus propagation (Supplementary File)
-
C. Gao and J. Liu, "Modeling and Restraining Mobile Virus Propagation (Supplementary File)," IEEE Trans. Mobile Computing, 2013.
-
(2013)
IEEE Trans. Mobile Computing
-
-
Gao, C.1
Liu, J.2
-
37
-
-
65449186691
-
Mobile call graphs: Beyond power-law and lognormal distributions
-
M. Seshadri, S. Machiraju, A. Sridharan, J. Bolot, C. Faloutsos, and J. Leskovec, "Mobile Call Graphs: Beyond Power-Law and Lognormal Distributions," Proc. 14th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining (KDD '08), pp. 596-604, 2008.
-
(2008)
Proc. 14th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining (KDD '08)
, pp. 596-604
-
-
Seshadri, M.1
MacHiraju, S.2
Sridharan, A.3
Bolot, J.4
Faloutsos, C.5
Leskovec, J.6
-
38
-
-
34250628484
-
Structure and tie strengths in mobile communication networks
-
DOI 10.1073/pnas.0610245104
-
J.P. Onnela, J. Saramaki, J. Hyvonen, G. Szabo, D. Lazer, K. Kaski, J. Kertesz, and A.L. Barabasi, "Structure and Tie Strengths in Mobile Comm. Networks," Proc. Nat'l Academy of Sciences of USA, vol. 104, no. 18, pp. 7332-7336, 2007. (Pubitemid 47185905)
-
(2007)
Proceedings of the National Academy of Sciences of the United States of America
, vol.104
, Issue.18
, pp. 7332-7336
-
-
Onnela, J.-P.1
Saramaki, J.2
Hyvonen, J.3
Szabo, G.4
Lazer, D.5
Kaski, K.6
Kertesz, J.7
Barabasi, A.-L.8
-
40
-
-
34548364116
-
Analysis of the reliability of a nationwide short message service
-
DOI 10.1109/INFCOM.2007.211, 4215793, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
X. Meng, P. Zerfos, V. Samanta, S.H. Wong, and S. Lu, "Analysis of the Reliability of a Nationwide Short Message Service," Proc. IEEE INFOCOM, pp. 1811-1819, 2007. (Pubitemid 47334411)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 1811-1819
-
-
Meng, X.1
Zerfos, P.2
Samanta, V.3
Wong, S.H.Y.4
Lu, S.5
-
41
-
-
2142758072
-
Technological Networks and the Spread of Computer Viruses
-
DOI 10.1126/science.1095845
-
J. Balthrop, S. Forrest, M.E.J. Newman, and M.M. Williamson, "Technological Networks and the Spread of Computer Viruses," Science, vol. 304, no. 5670, pp. 527-529, 2004. (Pubitemid 38541898)
-
(2004)
Science
, vol.304
, Issue.5670
, pp. 527-529
-
-
Balthrop, J.1
Forrest, S.2
Newman, M.E.J.3
Williamson, M.M.4
-
42
-
-
6344221308
-
Forecast and control of epidemics in a globalized world
-
DOI 10.1073/pnas.0308344101
-
L. Hufnagel, D. Brockmann, and T. Geisel, "Forecast and Control of Epidemics in a Globalized World," Proc. Nat'l Academy of Sciences of USA, vol. 101, no. 42, pp. 15124-15129, 2004. (Pubitemid 39391729)
-
(2004)
Proceedings of the National Academy of Sciences of the United States of America
, vol.101
, Issue.42
, pp. 15124-15129
-
-
Hufnagel, L.1
Brockmann, D.2
Geisel, T.3
-
43
-
-
76049115282
-
Multiscale mobility networks and the spatial spreading of infectious diseases
-
D. Balcan, V. Colizza, B. Goncalves, H. Hu, J. Ramasco, and A. Vespignani, "Multiscale Mobility Networks and the Spatial Spreading of Infectious Diseases," Proc. Nat'l Academy of Sciences of USA, vol. 106, no. 51, pp. 21484-21489, 2009.
-
(2009)
Proc. Nat'l Academy of Sciences of USA
, vol.106
, Issue.51
, pp. 21484-21489
-
-
Balcan, D.1
Colizza, V.2
Goncalves, B.3
Hu, H.4
Ramasco, J.5
Vespignani, A.6
-
44
-
-
79960004379
-
Phase transitions in contagion processes mediated by recurrent mobility patterns
-
D. Balcan and A. Vespignani, "Phase Transitions in Contagion Processes Mediated by Recurrent Mobility Patterns," Nature Physics, vol. 7, no. 7, pp. 581-586, 2011.
-
(2011)
Nature Physics
, vol.7
, Issue.7
, pp. 581-586
-
-
Balcan, D.1
Vespignani, A.2
-
45
-
-
31444431866
-
The scaling laws of human travel
-
DOI 10.1038/nature04292, PII NATURE04292
-
D. Brockmann, L. Hufnagel, and T. Geisel, "The scaling Laws of Human Travel," Nature, vol. 439, no. 7075, pp. 462-465, 2006. (Pubitemid 43152835)
-
(2006)
Nature
, vol.439
, Issue.7075
, pp. 462-465
-
-
Brockmann, D.1
Hufnagel, L.2
Geisel, T.3
-
46
-
-
39049095674
-
Impact of human mobility on the design of opportunistic forwarding algorithms
-
A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott, "Impact of Human Mobility on the Design of Opportunistic Forwarding Algorithms," Proc. IEEE INFOCOM, pp. 606-620, 2006.
-
(2006)
Proc. IEEE INFOCOM
, pp. 606-620
-
-
Chaintreau, A.1
Hui, P.2
Crowcroft, J.3
Diot, C.4
Gass, R.5
Scott, J.6
-
47
-
-
49149084034
-
Finding a better immunization strategy
-
Y. Chen, G. Paul, S. Havlin, F. Liljeros, and H.E. Stanley, "Finding a Better Immunization Strategy," Physical Rev. Letters, vol. 101, no. 5, p. 058701, 2008.
-
(2008)
Physical Rev. Letters
, vol.101
, Issue.5
, pp. 058701
-
-
Chen, Y.1
Paul, G.2
Havlin, S.3
Liljeros, F.4
Stanley, H.E.5
-
48
-
-
0942268259
-
Efficient immunization strategies for computer networks and populations
-
R. Cohen, S. Havlin, and D. Ben-Averaham, "Efficient Immunization Strategies for Computer Networks and Populations," Physical Rev. Letters, vol. 91, no. 24, p. 247901, 2003.
-
(2003)
Physical Rev. Letters
, vol.91
, Issue.24
, pp. 247901
-
-
Cohen, R.1
Havlin, S.2
Ben-Averaham, D.3
-
49
-
-
0036349136
-
On distinguishing between internet power law topology generators
-
T. Bu and D. Towsley, "On Distinguishing Between Internet Power Law Topology Generators," Proc. IEEE INFOCOM, pp. 638-647, 2002.
-
(2002)
Proc. IEEE INFOCOM
, pp. 638-647
-
-
Bu, T.1
Towsley, D.2
-
50
-
-
79955102913
-
The dynamic nature of contact networks in infectious disease epidemilogy
-
S. Bansal, J. Read, B. Pourbohloul, and L.A. Meyers, "The Dynamic Nature of Contact Networks in Infectious Disease Epidemilogy," J. Biological Dynamics, vol. 4, no. 5, pp. 478-489, 2010.
-
(2010)
J. Biological Dynamics
, vol.4
, Issue.5
, pp. 478-489
-
-
Bansal, S.1
Read, J.2
Pourbohloul, B.3
Meyers, L.A.4
|